Deck 3: System Administration 2
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 3: System Administration 2
1
The default shell prompt for a regular user in the bash shell is
A) /
B) .
C) ..
D) $
A) /
B) .
C) ..
D) $
D
2
To view the contents of a folder, we can use the command
A) ls
B) head
C) pwd
D) cd
A) ls
B) head
C) pwd
D) cd
A
3
When using a shell program, command options also called flags or switches are
A) Debates between users on which command to use
B) Data provided to a command to use as input
C) Single letters of full words that modify the behavior of the command in a pre-determined way
D) Debates among system administrators on which commands to use
A) Debates between users on which command to use
B) Data provided to a command to use as input
C) Single letters of full words that modify the behavior of the command in a pre-determined way
D) Debates among system administrators on which commands to use
Single letters of full words that modify the behavior of the command in a pre-determined way
4
In the context of system administration, the kernel is
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Common shell programs include
A) Bourne shell, C shell, D shell
B) Born shell, C shell, Born again shell
C) Korn shell, Born shell, C shell
D) Bourne shell, C shell, Bourne-again shell
A) Bourne shell, C shell, D shell
B) Born shell, C shell, Born again shell
C) Korn shell, Born shell, C shell
D) Bourne shell, C shell, Bourne-again shell
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The command used to delete files and folders in Unix/ Linux is
A) del
B) rm
C) grep
D) cd
A) del
B) rm
C) grep
D) cd
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
In the context of system administration, the shell is
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
An example of an absolute path is
A) ./temp.txt
B) /temp.txt
C) temp.txt
D) ../temp.txt
A) ./temp.txt
B) /temp.txt
C) temp.txt
D) ../temp.txt
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The parent folder of the current folder is represented in Linux by
A) /
B) .
C) ..
D) $
A) /
B) .
C) ..
D) $
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
To view the contents of a file, we can use the command
A) less
B) more
C) cat
D) all of the above
A) less
B) more
C) cat
D) all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
The current folder is represented in Linux by
A) /
B) .
C) ..
D) $
A) /
B) .
C) ..
D) $
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The command used to copy files in Unix/ Linus is
A) cp
B) copy
C) pwd
D) rm
A) cp
B) copy
C) pwd
D) rm
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The filesystem root is represented in Linux by
A) /
B) .
C) ..
D) $
A) /
B) .
C) ..
D) $
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Permissions -rwxr-xr-on a file indicate that
A) Anybody can read the file
B) The root user is the owner of the file
C) The owner can read/ write/ execute, the group and world can read the file
D) The owner can read/ write/ execute, the group can read or execute and the world can read the file
A) Anybody can read the file
B) The root user is the owner of the file
C) The owner can read/ write/ execute, the group and world can read the file
D) The owner can read/ write/ execute, the group can read or execute and the world can read the file
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The default shell prompt for the root user in the bash shell is
A) #
B) .
C) ..
D) $
A) #
B) .
C) ..
D) $
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
An example of a relative path is
A) /temp.txt
B) /usr/temp.txt
C) ~/temp.txt
D) /home/joe/temp.txt
A) /temp.txt
B) /usr/temp.txt
C) ~/temp.txt
D) /home/joe/temp.txt
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
To find the location of a file named temp.txt somewhere within the /usr folder, we can use the command
A) find temp.txt
B) grep temp.txt
C) find /usr -name temp.txt
D) find /usr temp.txt
A) find temp.txt
B) grep temp.txt
C) find /usr -name temp.txt
D) find /usr temp.txt
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
In the context of system administration, the operating system is
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
A) Software that manages computer hardware and provides common services to user applications
B) Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
C) A text based program that allows users to interact with the shell
D) The graphical interface for users to interact with applications
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
To navigate to a specific folder, we can use the command
A) grep
B) ls
C) pwd
D) cd
A) grep
B) ls
C) pwd
D) cd
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
When using a shell program, command arguments are
A) Debates between users on which command to use
B) Data provided to a command to use as input
C) Single letters of full words that modify the behavior of the command in a pre-determined way
D) Debates among system administrators on which commands to use
A) Debates between users on which command to use
B) Data provided to a command to use as input
C) Single letters of full words that modify the behavior of the command in a pre-determined way
D) Debates among system administrators on which commands to use
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
ls -l output of "-rw-r--r-- 1 jon johny 3969 May 29 10:20 README" indicates that the owner of the file is
A) jon
B) johny
C) README
D) 3969
A) jon
B) johny
C) README
D) 3969
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Permissions -rwxr-xr-on a file can also be written as
A) 755
B) 654
C) 754
D) 655
A) 755
B) 654
C) 754
D) 655
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
In the Unix/ Linux world, yum is used to
A) Install and update packages, and track dependencies among packages
B) Indicate happiness with the system
C) Install the operating system
D) Remove the operating system
A) Install and update packages, and track dependencies among packages
B) Indicate happiness with the system
C) Install the operating system
D) Remove the operating system
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Vi is a
A) Graphical editor
B) Text editor
C) Game on Linux systems
D) Substitute for MS Word
A) Graphical editor
B) Text editor
C) Game on Linux systems
D) Substitute for MS Word
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Permissions -r-xr-xrw- on a file can also be written as
A) 755
B) 654
C) 655
D) 556
A) 755
B) 654
C) 655
D) 556
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck